Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
f04068ecffd82ee4274864086578c66e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f04068ecffd82ee4274864086578c66e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f04068ecffd82ee4274864086578c66e_JaffaCakes118.html
-
Size
227KB
-
MD5
f04068ecffd82ee4274864086578c66e
-
SHA1
6dfafc1e61aa0049daa141b546387b38ff7418d5
-
SHA256
c32a0c5c0bdd322ce43eca918d5e0793d85d06162d53483f2919fc3fe8e58e1b
-
SHA512
4d32047e0004f430f7954db671abb882fed5934590e1bc6ca886e118d525b08324f698dbf0a3a4ce67d5cc877d1faf0902dedcc3d1edabb58af22e4155991a04
-
SSDEEP
3072:ijTUaLrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJQ:+4a/z9VxLY7iAVLTBQJlQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5A067941-783B-11EF-86DF-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30375648480cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433100047" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000a76be324a50de873aae513b5550f6a7efac96a132a765fe9498f9a38e92095c2000000000e8000000002000020000000f07586153e56d2084762bf21a1887b8333f9bcfbd2b250ed5a20177d82f02e7020000000427f5c329ee9eac32887a1509828965141d442adb55de4f8913b1095429e15cc40000000ff1a8335a9376eea3bfe299e60bc34f7833e07c23e67e41c783d9a0950e7dd483123def8b3803b4a6a2f68f09adabe9592e2303431169f3757dcf6cc11f4283b iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2164 2352 iexplore.exe 29 PID 2352 wrote to memory of 2164 2352 iexplore.exe 29 PID 2352 wrote to memory of 2164 2352 iexplore.exe 29 PID 2352 wrote to memory of 2164 2352 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f04068ecffd82ee4274864086578c66e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7079c44b171c577ec235cbd0525dc55
SHA13653931a0c6084c49fb28dc48f6948a9e4c79828
SHA256382b50763310aaddfa43ff1e002530574c8a88f5f9cdb51da8b222e091fcaa22
SHA512dc0052a6e5f71882937489b7bb2d446997c01e537b523aa86a5dd2573fc5ea60ecfc291d996dc6974ef042cc8a85986281c42258df2e397864f0dd4a0e5589f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df990520677b50e643a31461ddd741de
SHA1afba6b33733e177696e1aa24bad8936a9535b2a4
SHA2563bf6d2e4ec3ec9dbce1ff95d996d4f4d994355c4f3125721a3d8e8b102a7e65d
SHA512631fcba822452b200634212123c929cd3469e14710957fb0a8d55d1408b1cf8f58e111ca315ae1f714a2c5f96f14b2b4ca8a8d78b14e1ee73401f374a700dde2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631de2adbc822f6678f20c14daf32fae
SHA106ef198fcd776302f3cd8435d75ce7230a840033
SHA25671bf08e6ccac1c4e089912e2475b77e385166b483ebd771a50addda2dfefb25a
SHA51243d25a96d49c4369364fb29b9e5eae076bd161845377797312cd79b55398d06215712e76b3301f629a1dc00823cc8a346da882da6ae0b845e6c579f7c4a1da2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c946e30dd0454b8935aa6c9ccb101550
SHA1db52a25fa7a9bf509a34ee6e04cb044d042b525b
SHA256efad9c5792f25807db6a46c1bc38242c91222607096104d1d1324b0413680d93
SHA5129eba718fe119370573fa3f2c0408c08838ba40ecdce6428a830c46a2e875a23a61bfe9d2518fa8fa4e7a8fc78af8060ec40e95bfe9765e000f9ab7a4b801c485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ca7d772fbd21d16c378ef90a1a8dd2
SHA1a1c8b29ac9c70999d9e885c5ee5f7b95884bad4d
SHA2569b45d1462e33cce18a8a4dd32bcf1691e3f1540ac4552ae2512a60f29af0ae16
SHA512ec4e311a8de41ae45f20d43c83486fd82b6412deb235e48a1074b34fe7e033a5451b63e9b700306a8c4492e9383aa6bc0cb4083270b34649391834506f446729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58666fe5e0c084ff75a4013f69f8628a1
SHA1d649b951ff2da43b8c527cd8e09a84e1caa7c5b2
SHA2563c5b11c195aee12c3602a686b4453cc963d4b76aa49026c591aa096f31eacd76
SHA512b5d89638d87c597a251d67296c8f75ea5686c110e9502ebc6524e24567045293300facee2b641e45814c91437c25b39c64e167baf6bf39caf9db6c2d4d4b577c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57879c489ab8145e1b623f0c2e374a40b
SHA1b4957f5ef0e3575b7703d69fa550bc3af33af6c4
SHA256eebdc841cc41627667e9f6219439c6823669ed66783229a4e6e960ed685a00f0
SHA5126e1bc6e7f37b5d0e2fc52df2e46da6acb2346f1e8a254d6cfe24843fdc8669087d0dc68491d4c0138edcc10fa4d4c1de471817651a0f515c2b5ef45277d7ef1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e878c7d300ec8af1a7fbf6f36f20ebd
SHA1a59d02a698c006f09d5ba904e6ea3e1e9943ad6a
SHA256a34403a2ad33cacb01b87756212723e67612e5f8034934e3e24200c575bbf48c
SHA5120fcd4525e296dfcdd5c1f4df422623ac5694f39b0aa94092dd9128d005c093dae65e74236fb6c1295bc925267abae2fc9c498d601caa5e984bc12535bb87e16b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6db384609aee63b21b10fd62a2fa36
SHA1a3786d45fba4b803e02bfb88f52cbe77686448d8
SHA25689c1a3973aa1f8c29203af2bd2402a3fcd9d5c51432239ac2d6fe773f777acdd
SHA512575c8aed7fe1005b36689e3d5202890cc5d812f2e24868c93b1f3ef84bdf24cd44a4e3751bcc1d4b6e4f0dbf63b0b86c49e388c2afa1f299ecc078be0e467f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8ee8c90ad9401e301fa3974b91c7df
SHA1da89f1bd5dbd3d3cddfccd5b7ac07530ac4c7899
SHA2563b9b8552999ba65b2bf43a31dae1ab48f580cc697f638cf2e217ba21066b79c2
SHA51289eda2c137c92b46c7aa1f10d0e8b22fc5bf992987105058fbd6356e3a49ccad057cdf9ea92f3bb55c5c53ce65563af972c1a404c4c21cbbbf1a93a94a5aa974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c89333db6ce8d046148a3c9b824a6c
SHA165c097485ad5376d6ce251d87af718230bec2793
SHA2566c87101ab3463a52b9cb89394987ae8edb5a94b2f4ab3dfa9594dbe5f4b913d9
SHA512e3e4b85d9a6e60464805e0ba1d79fb6c164cb25bcc5a4c0dabf54aba972dd7150363f338f3eec13d41fe332a97d2624576be0879c3f625252cb65d2ae8c8b67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf79378e2d805b58a85436e8764f9f82
SHA150c66ab6ca7aa8990ae1deecd10cb1c45b0d6f23
SHA2566e9c4332a008ff8cb65be1afaa7fb92a2f23fed3b4685ce720b27d1844b9caa9
SHA5128b12bd9a046a9a803df418b9ca49371d21dd5f4dc8ed74f13086fce6b962fe9d58f4119003fd2aac780464e09edda521ec9de1c76989d3bca8d6fa9a6f8fb626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57faba50c0afd77d06a327d15e58dfdcc
SHA106a6889afea24911b3921c59571ab54ea377a185
SHA2566842cb00067ae7514fd0094e079fc7b7baeff5c5186b1870fcb67709301a4c44
SHA51293ae0477c5dae3fd1d43911d6df2f1d72f86379ff5c55d0a777e3c6811b49b1d3e4dafbc4861c821ea19db27d9248bf7f763cb078049ba1303f8bcb4399e4b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbe80bd4a5d984ec3e48c7d2825c3b0
SHA1025670bda33232173dac8c2c14187a94bb8cb880
SHA256aefd612fc299848b5f154155a1118e0cf6db55ea1100c215881491651809e5e7
SHA51224ea45e7bead65e131f5c1d201b89fd0bdab6b05938dff35a0d7038d2c94d186745b94218e68a871a1811df1f0c02e70f3f970a6dfbbc5f90fcb60e1e451e8b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f408e07c5e970d998024b68e5ebc360d
SHA1de06b2eb5b367d95d13b183b1576a06864b25fd5
SHA2564d328cbc8d49397c7a7c91fc43185a9e6ab7bbc88017757e67112e5a275dbd99
SHA512cba777b687c43fc561cd238c39cc2859001be071a368fa24c0a82ac13bc4a8540eea09e7af5c54b5b84874dcb8dbbc1264d05a05ffa86f026bbd70071d8aff82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508db08562d9a1ba55a516172d58ff474
SHA14182dc89c85495a176e5c5c67cad1dc1afbdb376
SHA2567f3aba7e836bd4971a8e9a29ee0547f64cb2c952bc0172bbe1210764fdc10eca
SHA512c3e9a94ea282a6d47915010303048d42cd6672843f9158419b5573534a682199fdc80306d57af028ecf4e668939044656214875f369b54979be6b6f4bd1237f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37938622afb5209711e602a7b5e4760
SHA18cfc67863b970810a71aff44c705e36ecfc34447
SHA256980a7b2c34567fffaeb7b49f51a6a12986825a28c6432a8275f20ab75289ace8
SHA5126b2d212f979076c68d782b6c2a5cbf1df0bd90406e97aaaa21bdbb5c121e2d8d16a0d0ea40da21170814814d8ba6fe0bb3716b89dec8b3376ffd5269c6ad3141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e572d2f452eaddcdfa6e37ad22e910
SHA14b4d48367c5ad76041868f0553b01fb5552d68e9
SHA256fd25479acfcfcd9e8eade3bef852bd1aed164ca0a9d8fcdcfcf90e6ef19bfca1
SHA512596e4da7e916243fe391dd059902498ae10c97258c19937807b978119208f58df886828b1536993ffcdf492bb487c6e8956764b5a1138945edd68a2f79978de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55daeabcdecd9404015c3265d41e0bf0f
SHA15a1389a409cdd3914f6fc4bb68e4585c57f7afe3
SHA2560ac911f1713d83c0b5bc704810fd472a51575d223bc7056ee1ae9401e9d41320
SHA51292e251917d2a5771c354bb603aa1d8160f7cc53a1beea4eee342b07a805e3ed675f88284f50bc6d87c4760ae997a977b054a177d00b665b819a55ef1e1ce61e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b